SUNDM Keywords
The following configuration keywords are available to alter or tailor the execution of the Data Manager:
|
Keyword |
Usage |
|
Controls scanning of file names beginning with an underscore. | |
|
Controls the auto rollback feature. | |
|
Controls user access to secondary or backup replication servers. | |
|
Forces the replication task to open files in shared mode. | |
|
Replication is started the same as when the '-b' command line option has been specified. | |
|
Defines the buffer size used during replication. | |
|
Controls client PATH and SEARCHPATH verb access. | |
|
Controls the ANSI IO behavior. | |
|
Overrides a previously installed authorization number. | |
|
Controls the auto compaction feature for ISAM files | |
|
Control the server's file size checking. | |
|
Control the server's child connection recovery logic. | |
|
Control the server's child connection recovery logic for COPYFILE operations. | |
|
Establish the default working directory for the data manager process. | |
|
Delays closing of file variables opened at the server. | |
|
Control Datapoint file name processing. | |
|
Control locking errors. | |
|
Specify the IP address or host name of the server. | |
|
Define an IP filter for client connections. | |
|
Enable detection of stalled clients by the server. | |
|
Define the client access control information. | |
|
Define the local IP address. | |
|
Defines the maximum log file record length. | |
|
Allows log file records to be variable length. | |
|
Enable data manager logging. | |
|
Specify the log file maximum size. | |
|
Configure the log on timeout value. | |
|
Define the long keep-alive duration. | |
|
Prevents a user logoff or shutdown. | |
|
Modify the data manager's internal open logic. | |
|
Allow read access to third party programs.. | |
|
Control caching of isam header information. | |
|
Modify the data manager's internal open once logic to allow shared access. | |
|
Modify the data manager's internal open once logic. | |
|
Specify the IP port number assigned to the data manager task. | |
|
Create ISAM and AAM files using the version 8.7 file format. | |
|
Defines an optional key used to encrypt messages to and from all clients. | |
|
Control file name substitutions. | |
|
Defines the default schema database file | |
|
Defines the number of seconds the server will wait for tasks to terminate before aborting. | |
|
Increases the lost connection time-out value in the server. | |
|
Force the creation of a new listening socket after an idle period. | |
|
Defines the number of seconds required before a secondary server assumes control. | |
|
Identify hosts in a replication network. | |
|
Define the number of seconds a secondary server will keep a file open. | |
|
Define the log on server's address. | |
|
Define replicated drives and directories. | |
|
Define replicated drives and directories. | |
|
Control file deletion on secondary or backup servers. | |
|
Specifies the uppercase translation table. | |
|
Define path and name substitutions. | |
|
Specify how long the runtime should wait when a Windows ERROR_LOCK_VIOLATION occurs. | |
|
Controls the storage of path information in ISAM and AAM files. | |
|
Control idle time when waiting for a lock. | |
|
Provide data file path information. | |
|
Define default path for files created. | |
|
Define Datapoint drive and evironment aliases. | |
|
Perform specialized code during write statements. | |
|
Identifies a public encryption key for replication. | |
|
Controls directory scanning after a rollover. | |
|
Define the seconds between directory scans. | |
|
Control secondary scanning of secondary or backup servers. | |
|
Define the number of I/O operations to buffer. | |
|
Control the replication transaction processing. | |
|
Define the server type. | |
|
Define replicated drives and directories. | |
|
Define replicated drives and directories. | |
|
Controls the replication of time stamp and attributes for directories. | |
|
Controls the replication of time stamp and attributes for files. | |
|
Controls the enhanced replication support. | |
|
Define a communication validation address. | |
|
Defines the WAL file directory. | |
|
Defines the segments in a WAL file. | |
|
Defines the number of seconds a dirty WAL file can remain in memory before being written. |
Administrative Access Keywords
|
Keyword |
Usage |
|
Clears data items kept by the main server task. | |
|
Sets data items kept by the main server task. | |
|
Specifies the admin host address. | |
|
Enables IP Filtering. | |
|
Defines the LOGON key file. | |
|
Control logging of child tasks. | |
|
Define the initial logging level for all tasks. | |
|
Specifies a user provided logon encryption key. | |
|
Enabled or Disable administrative emails | |
|
Defines the administrative email outgoing mail server | |
|
Configures the administrative email receipients | |
|
Defines the administrative email sender | |
|
Configures administrative emails for the replicator | |
|
Triggers an email when the maximum users for the Data Manager has been reached. | |
|
Sends an email when the Data Manager has been started. | |
|
Sends an email when the Data Manager has been stopped. | |
|
Defines the subject of the administrative emails. | |
|
Defines the blind carbon copy recipients of the administrative email. | |
|
Defines the carbon copy recipients of the administrative email. | |
|
Configure the user login for the email server. | |
|
Configures the user password for the email server | |
|
Defines the port for the email server. | |
|
Enables SSL for the email server. | |
|
Defines a timeout value when communicating with the email server. | |
|
Provides debug tracing via email. | |
|
Provides debug tracing via email. | |
|
Provides delivery confirmation of the administrative emails. | |
|
Reports receipt of the administrative emails. | |
|
Defines the administrative email return address. | |
|
Defines the administrative email Reply To address | |
|
Control administrative access via the main logon port. | |
|
Defines the port number of the admin task. | |
|
Specifies a user provided public encryption key. | |
|
Controls the file manage via a task bar icon. | |
|
Controls the creation of the admin task. |
SQLIO Access Keywords
|
Keyword |
Usage |
|
Defines the database connection string. | |
|
Defines the logging level for the SQLIO subsystem. | |
|
Defines the driver used by SQLIO.. | |
|
Defines the extension parameters used to make the connection. | |
|
Defines the optional database connection flags. | |
|
Defines the host used to make the connection. | |
|
Defines the password used to make the connection. | |
|
Defines the type of SQL used.. | |
|
Forces the use of the SQL SERVER 'SCOPE_IDENTITY' function to get the last IDENTIFY value | |
|
Defines the type of SQL used.. | |
|
Defines the user named used to make the connection. | |
|
Defines the schema database name. | |
|
Defines the database name where current application SQL data tables are accessed. |
In addition, the Data Manager allows the SQLite database engine to be loaded and used as a driver using keywords from the Sundm CFG file. This feature allows a PLB program to access the SQLite database engine by referencing user defined keywords in the runtime INI and the Data Manager CFG files.
Example 1:
PLBWIN INI keyword to access SUNDM:
SOMEKEYDM=FILEMAN,127.0.0.1
SUNDM CFG keyword to access SQLite database engine:
SOMEKEYDM=SQLite
PLB Program sample:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Example 2:
PLBWIN INI keyword to access SUNDM:
SOMEKEYDM=FILEMAN,127.0.0.1
SUNDM CFG keyword to access SQLite database engine:
SOMEKEYDM=SQLite,c:\sundmpath\mydm.db
PLB Program sample:
|
|
|
|
|
|
|
|
|
|
|
DBCONNECT MYDB, "SOMEKEYDM;;","","" |
|
|
|
|
See Also: SUNDM, SUNADMIN, MAKEMFD, WATCH
![]() |